GOOGLE HACKING FOR PENETRATION TESTERS
GOOGLE HACKING FOR
PENETRATION TESTERS
Chris Chromiak
SentryMetrics
March 27th, 2007
www.TASK.to
GOOGLE HACKING FOR PENETRATION TESTERS
What is Google Hacking?
It is NOT hacking into Google!!
Johnny Long is the “grandfather” of Google hacking.
His website http://johnny.ihackstuff.com is exclusively dedicated to
Google Hacking and you will find all sorts of cool information there.
Google is much more than just a simple search interface and engine.
Google crawls public websites for information every 6-8 weeks using an
automated search and record program called Googlebot.
As more of our business processes, intellectual property and research
and development moves to a web environment, it will be more important
for security professionals to have the skills required to evaluate their sites
from the perspective of a malicious search engine user.
© Toronto Area Security Klatch 2007 www.TASK.to
GOOGLE HACKING FOR PENETRATION TESTERS
Basic Google Operators
Exclude terms using the NOT operator (minus sign)
For example, searching SANS –GIAC will give you everything that has
SANS but not GIAC
Include common words using the AND operator (plus sign)
For example, searching SANS +GIAC will give you everything with the
words SANS and GIAC
Searching for exact phrases must be surrounded by double quotes
For example, “SANS and GIAC” will return all results that have SANS and
GIAC as a phrase
Wildcards are represented by an asterisk
Searching for SANS * “Storm Center” will return all entries with SANS any
word Storm Center
Google searching is not case sensitive so SANS, sans and SaNs are all
the same
www.TASK.to
GOOGLE HACKING FOR PENETRATION TESTERS
Some of the Advanced Google Search Techniques
Site - restricts a search to a particular site or domain
Intitle – finds strings in the title of a page
Inurl – finds strings in the URL of a page
Filetype – finds specific types of files based on file extension
Link – searches for links to a site or URL
Inanchor – finds text in the descriptive text of links
www.TASK.to
GOOGLE HACKING FOR PENETRATION TESTERS
Google Hacking Tools
Gooscan – Johnny Long’s free command line UNIX tool. It violates the
Google TOS. Gooscan automates queries designed to find potential
vulnerabilities on web pages against Google.
http://www.johnny.ihackstuff.com
SiteDigger – A Windows tool that searches Google’s cache to look for
vulnerabilities, errors, configuration issues and proprietary information on
websites. http://www.foundstone.com/resources/proddesc/sitedigger.htm
Wikto – Wikto is a Windows based web server assessment tool that uses
the Google hacking database (GHDB). This tool requires a Google
developer license. http://www.sensepost.com/research/wikto
Advanced Dork – AdvancedDork is a Firefox extension designed to
quickly search for specific text inside Google’s Advanced Operators.
https://addons.mozilla.org/firefox/2144
www.TASK.to
GOOGLE HACKING FOR PENETRATION TESTERS
How to use the GHDB
The GHDB is the main repository for Google hacking tips and tricks
Go to the GHDB at http://johnny.ihackstuff.com/ghdb.php
Select the category you are interested in
Some very juicy information here such as sensitive directories, vulnerable
servers, files containing passwords, error messages (which give out way
too much information), web server detection and sensitive online
shopping information such as customer data and credit card numbers
Select the search criteria
Select the entry name to get more details
www.TASK.to
GOOGLE HACKING FOR PENETRATION TESTERS
Google Hacking Examples
Information Disclosure – Google can gather sensitive and private
information and contents as well as intellectual property assets
Vulnerability Assessment – Google is another component in the
penetration testing toolkit that allows you to identify, with a very low false
positive rate, vulnerable resources published on the Internet. These
mainly affect web based devices such as web servers, application servers
and network devices with a web based interface
Social Engineering – Google can also be used to map information from
the virtual world to the real world in order to perform social engineering
testing
www.TASK.to
GOOGLE HACKING FOR PENETRATION TESTERS
Information Disclosure
Database definitions and dumps
1. “#mysql dump” filetype:sql (for SQL definition files)
2. filetype:ora ora (for Oracle configuration files)
Exported Registry Settings
1. filetype:reg reg +intext:”internet account manager” (allows you to download the
registry to get juicy info like usernames, mail server settings, etc.)
Login Credentials: Usernames and Passwords
1. filetype:pot inurl:john (passwords stored in a file john.pot by John the Ripper
publicly available on the Internet)
www.TASK.to
GOOGLE HACKING FOR PENETRATION TESTERS
Vulnerability Assessment and Penetration Testing
Identifying vulnerabilities and use Google to do your intelligence gathering
Look for misconfigurations or “non” configurations
Examples would include default installations, private web interfaces and
identifying devices such as printers
Intitle:”Welcome to IIS 4.0” will find many default installations of IIS 4.0 –
you now own that server – scary!!
Intitle:”Cisco Systems, Inc. VPN 3000 Concentrator” will get you access
to the web interface and chances are many of these have the default
username and password
inurl:printer/main.html intext:settings will give you ownership of publicly
accessible network printers
Filetype:rdp rdp will get you RDP access to many systems on the Internet
(some of which don’t have usernames or passwords!!)
www.TASK.to
GOOGLE HACKING FOR PENETRATION TESTERS
Social Engineering
Google groups is an online public discussion forum
Thousands of newsgroup messages are posted here daily, some of them
containing very sensitive information
A simple search for your organization’s domain name can return a lot of social
engineering information such as valid employee names, email addresses,
resources and other details
Google group operators include:
1. author – searches for the author of a post based on name – author:@sans.org
2. group – allows you to find specific groups related to a given topic –
group:*.hacking.*
3. insubject – allows you to find searched terms within the message subject line –
insubject:”google hacking”
4. msgid – newsgroup messages uniquely identified by a message ID that looks
like an email address with a random username – msgid:
[email protected] www.TASK.to
GOOGLE HACKING FOR PENETRATION TESTERS
Google Hacking Defenses
Use common sense!! Basic security practices is all it takes. Defense in
depth, act diligently when configuring web based devices and have a
strong corporate security policy
Use Google hacking techniques to uncover your own security problems.
So…..Google hack yourself!
Work with Google for help in removing security breaches. They are easy
to work with and want to help! You can find contact info on their site.
www.TASK.to